General
-
Target
sigiemka.exe
-
Size
33KB
-
Sample
240829-qc3ydashle
-
MD5
501167f3c821673f624af5cbf7e7fe60
-
SHA1
8dcf8fb0f71e9264a4fc28bada9b7627827948b9
-
SHA256
a0e629e2a5ad3dd0b5f4926ddd45fed6b5b07bd33fc90abb6f2d4ac3c573a055
-
SHA512
3b7826ef2592f9c33d613b3988a0b05d83779f693fcab4bd37e846e5d57d0f5ba02a91afc6c3e721cdc56e61fb470a4f34d247def4f697f9cf4a697bd2079bae
-
SSDEEP
384:il+PkjD9+E5MFs7iui8L7znM42pfL3iB7OxVqWYRApkFXBLTsOZwpGN2v99Ikuiz:K+CD93W03M42JiB706VF49j1OjhBbW
Behavioral task
behavioral1
Sample
sigiemka.exe
Resource
win11-20240802-en
Malware Config
Extracted
xworm
5.0
lefferek-42016.portmap.host:42016
IwOvHxuUoVPxFI5S
-
install_file
USB.exe
Targets
-
-
Target
sigiemka.exe
-
Size
33KB
-
MD5
501167f3c821673f624af5cbf7e7fe60
-
SHA1
8dcf8fb0f71e9264a4fc28bada9b7627827948b9
-
SHA256
a0e629e2a5ad3dd0b5f4926ddd45fed6b5b07bd33fc90abb6f2d4ac3c573a055
-
SHA512
3b7826ef2592f9c33d613b3988a0b05d83779f693fcab4bd37e846e5d57d0f5ba02a91afc6c3e721cdc56e61fb470a4f34d247def4f697f9cf4a697bd2079bae
-
SSDEEP
384:il+PkjD9+E5MFs7iui8L7znM42pfL3iB7OxVqWYRApkFXBLTsOZwpGN2v99Ikuiz:K+CD93W03M42JiB706VF49j1OjhBbW
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Disables Task Manager via registry modification
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1